Chapter 2 Flashcards
The Concept of System Security
A secure system must deliver its intended behaviours and outcomes while avoiding unintended ones that may lead to unacceptable asset loss.
User Intent
User intent refers to the system delivering behavious and outcomes expected by the user, which is a key aspect of security.
Design Intent
Design intent implies that the system should meet the behaviours and outcomes defined in its design, which is another key aspect of security.
Primary Security Goal
The primary security goal is to ensure that the only intended behaviours and outcomes take place within and through the system. Every security requirement stems from this objective.
Mediated Access
Mediated access means controlling access by enforcing constraints and following non-conflicting rules, a fundamental principle in trustworthy secure design.
Security Policies
Security policies define the scope of control, bounds for application, and rules governing the behaviour and outcomes of subjects, objects, and operations. They are derived from various sources.
Trustworthiness and Security Policies
Trustworthiness depends on the accuracy, consistency, compatibility, and completeness of security policy rules. Inconsistencies or gaps can lead to vulnerabilities.
Adequately Secure System
An adequately secure system possesses resilience to adversity, behaviour and outcome control, and rule-based access control.
Resilience to Adversity
Resilience to adversity implies that a secure system can deliver its intended capabilities even when facing deliberate or accidental adversities.
Rule-Based Access Control
Rule-based access control involves enforcing rules to permit authorised human-to-machine and machine-to-machine interactions while ensuring behaviour and outcome control.
Determining Adequate Security
Adequate security depends on evidence-based assessments that optimise security while considering performance objectives and constraints. It is context-dependent and subjective.
As Secure as Reasonable Practicable (ASARP)
Being ASARP means increasing security further would result in disproportionate costs, schedule delays, or unacceptable compromises
Protective Failure
Protective failure involves detaching form an insecure state or impending transition to one and taking responsive actions to prevent further failures.
Protective Recovery
Protective recovery focuses on transitioning from an insecure state to a secure state or a less insecure one while preventing further state transitions.
Characteristics of Systems
The security and trustworthiness of systems are influenced by various characteristics, interactions with other systems, and their roles within a system of systems.